COMP SCI 3309 - Cybersecurity A Practical Application

North Terrace Campus - Winter - 2018

In this course, students will be involved in a simulation of real world security applications. Students will be required to learn and apply both offensive and defensive security techniques in conjunction with other Computer Science related skills in order to defend their own networks, whilst attacking others. This course focuses on tasks that cyber security specialists require to perform their roles, including identifying vulnerabilities, creating exploits, and creating mitigations. Students will be required to work in teams to complete this course.

  • General Course Information
    Course Details
    Course Code COMP SCI 3309
    Course Cybersecurity A Practical Application
    Coordinating Unit School of Computer Science
    Term Winter
    Level Undergraduate
    Location/s North Terrace Campus
    Units 3
    Contact Up to 3 hours per week
    Available for Study Abroad and Exchange N
    Prerequisites COMP SCI 1103 or COMP SCI 2103
    Assumed Knowledge COMP SCI 2005
    Course Description In this course, students will be involved in a simulation of real world security applications. Students will be required to learn and apply both offensive and defensive security techniques in conjunction with other Computer Science related skills in order to defend their own networks, whilst attacking others. This course focuses on tasks that cyber security specialists require to perform their roles, including identifying vulnerabilities, creating exploits, and creating mitigations. Students will be required to work in teams to complete this course.
    Course Staff

    Course Coordinator: Matthew Hart

    Course Timetable

    The full timetable of all activities for this course can be accessed from Course Planner.

  • Learning Outcomes
    Course Learning Outcomes
    Students will learn offensive security techniques  including:
    1. The ability to identify vulnerabilities,
    2. Craft exploits from those vulnerabilities, and
    3. investigate and report on potential mitigations of vulnerabilities. 
    University Graduate Attributes

    This course will provide students with an opportunity to develop the Graduate Attribute(s) specified below:

    University Graduate Attribute Course Learning Outcome(s)
    Deep discipline knowledge
    • informed and infused by cutting edge research, scaffolded throughout their program of studies
    • acquired from personal interaction with research active educators, from year 1
    • accredited or validated against national or international standards (for relevant programs)
    1,2,3
    Critical thinking and problem solving
    • steeped in research methods and rigor
    • based on empirical evidence and the scientific approach to knowledge development
    • demonstrated through appropriate and relevant assessment
    1,2,3
    Teamwork and communication skills
    • developed from, with, and via the SGDE
    • honed through assessment and practice throughout the program of studies
    • encouraged and valued in all aspects of learning
    1,2,3
    Career and leadership readiness
    • technology savvy
    • professional and, where relevant, fully accredited
    • forward thinking and well informed
    • tested and validated by work based experiences
    1,2,3
  • Learning Resources
    Required Resources
    Students will be provided with access to the challenge infrastructure and online resources as required. 
  • Learning & Teaching Activities
    Learning & Teaching Modes
    This course is primarily done in teams with active practical work. Students are expected to work on the practical, and uncover as many vulnerabilities as possible.
    Workload

    The information below is provided as a guide to assist students in engaging appropriately with the course requirements.

    The information below is provided as a guide to assist students in engaging appropriately with the course requirements.

    As a guide, this course should be handled as a full time investment, and teams should expect to spend large amounts of time together detecting and exploiting vulnerabilities. A large component to this course is the final written report, and should be prioritised accordingly.
    Learning Activities Summary
    Students will be exposed to a wide range of vulnerabilities, and expected to investigate each vulnerability in depth – including details such as summaries, working exploits, and overall impact
  • Assessment

    The University's policy on Assessment for Coursework Programs is based on the following four principles:

    1. Assessment must encourage and reinforce learning.
    2. Assessment must enable robust and fair judgements about student performance.
    3. Assessment practices must be fair and equitable to students and give them the opportunity to demonstrate what they have learned.
    4. Assessment must maintain academic standards.

    Assessment Summary
    • 5% participation
    • 15% for completing over 70% of the challenges (including at least one Hard and one Diabolical challenge) (outcomes 1,2,3)
    • 20% executive summary report.  (outcomes 1,2,3)
    • 60% individual final written report. (outcomes 1,2,3). 
    Assessment Related Requirements
    No course-specific requirements.
    Assessment Detail
    Participation - Students will be required to work in teams to complete challenges, attend lectures, and fully engage with the course.

    Challenge completion – Teams will be required to complete at least 70% of the overall challenges, including at least one Hard and one diabolical challenge.

    Executive Summary – Teams will be required to develop and submit an executive summary of their findings as a team.

    Individual Written Report – Each student will be required to individually write up each of their findings, and submit a detailed written report.
    Submission
    All work will be submitted through the School of Computer Science’s electronic submission forums, including Canvas (myUni) and the School’s web submission gateway. All programs are to be submitted in the programming language specified, and text reports are to be submitted as PDF files.
    Course Grading

    Grades for your performance in this course will be awarded in accordance with the following scheme:

    M10 (Coursework Mark Scheme)
    Grade Mark Description
    FNS   Fail No Submission
    F 1-49 Fail
    P 50-64 Pass
    C 65-74 Credit
    D 75-84 Distinction
    HD 85-100 High Distinction
    CN   Continuing
    NFE   No Formal Examination
    RP   Result Pending

    Further details of the grades/results can be obtained from Examinations.

    Grade Descriptors are available which provide a general guide to the standard of work that is expected at each grade level. More information at Assessment for Coursework Programs.

    Final results for this course will be made available through Access Adelaide.

  • Student Feedback

    The University places a high priority on approaches to learning and teaching that enhance the student experience. Feedback is sought from students in a variety of ways including on-going engagement with staff, the use of online discussion boards and the use of Student Experience of Learning and Teaching (SELT) surveys as well as GOS surveys and Program reviews.

    SELTs are an important source of information to inform individual teaching practice, decisions about teaching duties, and course and program curriculum design. They enable the University to assess how effectively its learning environments and teaching practices facilitate student engagement and learning outcomes. Under the current SELT Policy (http://www.adelaide.edu.au/policies/101/) course SELTs are mandated and must be conducted at the conclusion of each term/semester/trimester for every course offering. Feedback on issues raised through course SELT surveys is made available to enrolled students through various resources (e.g. MyUni). In addition aggregated course SELT data is available.

  • Student Support
  • Policies & Guidelines
  • Fraud Awareness

    Students are reminded that in order to maintain the academic integrity of all programs and courses, the university has a zero-tolerance approach to students offering money or significant value goods or services to any staff member who is involved in their teaching or assessment. Students offering lecturers or tutors or professional staff anything more than a small token of appreciation is totally unacceptable, in any circumstances. Staff members are obliged to report all such incidents to their supervisor/manager, who will refer them for action under the university's student’s disciplinary procedures.

The University of Adelaide is committed to regular reviews of the courses and programs it offers to students. The University of Adelaide therefore reserves the right to discontinue or vary programs and courses without notice. Please read the important information contained in the disclaimer.